Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Insights paper June 20, 2024 Crypto and the Travel Rule: What’s Going On? Navigate crypto Travel Rule compliance: understanding its impact, the need for flexible solutions, and areas of focus for implementation. Client Story May 27, 2021 Healthcare high achiever finds a new path to internal audit excellence When business leaders are committed to continuous improvement, their organisations thrive under normal circumstances. But they also demonstrate extraordinary resilience when faced with unforeseen challenges. This story is about one healthcare nonprofit’s determination to “do even better” in its internal audit operation, which resulted in immediate opportunities to create value and a road map to… Flash Report February 23, 2022 The Russian Invasion of Ukraine: Its Potential Implications and Impact On February 21, after months of building up forces close to Ukraine’s borders, Vladimir Putin recognised the Luhansk and Donetsk regions of Ukraine as “independent people’s republics.” He ordered the Russian Defense Ministry to deploy troops in those regions to “maintain the peace.” These actions commenced on the anniversary of Russia’s invasion of Crimea almost eight years to the day. The… Survey January 3, 2023 ESG: A continental rift? Key findings from an Oxford-Protiviti Survey, Executive Outlook on the Future of ESG, 2032 and Beyond:Oxford-Protiviti executive survey with a 10-year outlook finds North American leaders less worried about environmental risk and ESG regulation, and less open to change.Executives in Europe and Asia-Pacific (APAC) perceive the stakes as higher and expect more change externally and within their… Whitepaper January 29, 2018 China’s Cybersecurity Law and its Impacts - Key Requirements Businesses Need to Understand to Ensure Compliance On June 1, 2017, China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Long before the Cybersecurity Law took effect, China had already made some efforts to strengthen information security. For example, a white paper titled The Internet in China, published in 2010, served as an early guide to China’s policy… Podcast Transcript May 5, 2023 Transcript | Making the most of the metaverse moment with tech futurist Cathy Hackl "Godmother of the metaverse" Cathy Hackl joins the VISION by Protiviti interview. Cathy is an author, speaker and media personality who has been featured on 60 Minutes and CNBC and in GQ, Vogue, WIRED and The Wall Street Journal. She is also the host of Adweek’s Metaverse Marketing podcast. Big Think named Cathy one of the top 10 most influential women in tech… Podcast January 11, 2023 Podcast | Preventing Hacking with Quantum Computing and other InfoSec Topics – with Mark Carney from Quantum Village We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the… Whitepaper February 20, 2023 One Year of Russian Sanctions: A Financial Services Industry Perspective On February 24, 2022, Russia invaded Ukraine. The global condemnation of the invasion has included an unprecedented number of sanctions against Russia that began being issued almost immediately and has continued as the war goes on, bringing with it large-scale economic disruption and untold human tragedy. For the financial services industry and the issuing nations, there are lessons to be learned… Podcast Transcript February 6, 2023 Transcript | Preventing Hacking with Quantum Computing and other InfoSec Topics – with Mark Carney from Quantum Village We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the… Blogs May 3, 2024 Seven ways to strengthen leadership succession and development Replacing a C-suite executive or high-potential employee can be costly. Yet many organisations’ leadership development and succession programs are hamstrung by inadequacies that can lead to damaging talent loss. Load More